Cloud Security - CISA Urges Protection for Microsoft Intune
Basically, hackers wiped devices at a company using Microsoft Intune, prompting a security warning from CISA.
CISA warns companies to secure Microsoft Intune systems after a major cyberattack on Stryker. Thousands of devices were wiped, disrupting operations. Organizations must enhance their security measures to prevent similar incidents.
What Happened
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert urging companies to enhance the security of their Microsoft Intune systems. This warning follows a significant breach at Stryker, a prominent medical technology company, where hackers gained unauthorized access and remotely wiped thousands of employee devices. The pro-Iran hacktivist group, Handala, claimed responsibility for this cyberattack, stating it was a retaliation for U.S. military actions.
CISA's announcement highlights the vulnerability of cloud management tools like Microsoft Intune, which Stryker utilized to manage its fleet of devices. The hackers exploited their access to Stryker’s Windows-based network, leading to widespread disruptions across the company's global operations. This incident serves as a stark reminder of the potential risks associated with remote device management systems.
Who's Affected
The breach primarily impacted Stryker’s employees, as thousands of devices—including personal phones and computers—were wiped clean of data. While Stryker has confirmed that its medical devices remain operational, the attack has caused significant outages in its supply, ordering, and shipping systems. The extent of data loss for affected employees remains uncertain, as Stryker did not disclose specific details about the wiped data.
Additionally, other companies using Microsoft Intune are at risk if they do not implement adequate security measures. CISA's warning is a call to action for organizations to review their security protocols and ensure that only authorized personnel can make critical changes to device management systems.
What Data Was Exposed
Although Stryker reported that no malware or ransomware was deployed during the attack, the hackers did misuse their access to delete data from numerous employee devices. This raises concerns about the potential exposure of sensitive information, as Handala claimed to have stolen data during the breach. However, they have not provided concrete evidence to support their claims.
The incident underscores the importance of securing cloud management systems, as they can be entry points for attackers seeking to disrupt operations or steal sensitive data. Organizations must be vigilant in monitoring access to these systems to prevent unauthorized actions.
What You Should Do
In light of this incident, CISA recommends that organizations take immediate steps to secure their Microsoft Intune systems. Key actions include:
- Implementing two-person approval processes for significant changes, such as device wipes.
- Regularly reviewing user access to ensure only authorized personnel can make critical changes.
- Monitoring network activity for any unusual behavior that may indicate a breach.
By taking these proactive measures, companies can better protect themselves against similar attacks in the future. The Stryker incident serves as a crucial lesson in the importance of securing cloud-based management tools to safeguard both corporate and employee data.
TechCrunch Security